Addressing the Risk of Unpatched Virtual Machines

ultimatewindowssecurity
With pass-the-hash and other horizontal kill chain techniques all attackers need is one unpatched system to get started. Then as long as they can find another system – and it doesn't have to be an “important” system – to compromise they can keep moving along the horizontal kill chain until they finally reach pay dirt either in the form of a domain wide privileged account or the information itself that they seek. That's why for the past few years I've been saying you have to do everything right on every system. We've seen over and over again that it only takes one system.
Watch Now

Spotlight

Onsite host Joe Zollo asks VMware CEO Raghu Raghuram and President Sumit Dhawan to break down the news coming out of VMware Explore Las Vegas.

OTHER ON-DEMAND WEBINARS

Building a Logical Data Lake with Data Virtualization

Historically data lakes have been created as centralized physical data storage platform for data scientists to analyze data. But lately the explosion of big data, data privacy rules, departmental restrictions among many other things have made the centralized data repository approach less feasible. Using Data Virtualization allows organizations to create a logical - or virtual data lake - without having to physically copy and centralize all of their data.
Watch Now

Top 3 Ways Remote Working Has Unknowingly Increased Your Security Risk

Users across the globe have left their office buildings along with the safety and security of the workplace. This has left companies at their most vulnerable because the full scope of their security exposure is unknown. Attackers are wise to the gaps and vulnerabilities that come from remote working. Not only has the attack surface increased in recent months, but the volume of COVID-19 spam, phishing attacks and malware has also skyrocketed. In a battle against timescales, many companies have taken shortcuts on security measures. But what they don’t realize is that failure to overhaul their remote working security strategies now, seriously threatens their productivity, reputation and long-term survival.
Watch Now

Webinar: Network Security in the 5G and IoT Environment

Sdxcentral LLC

There has been an increasing demand for 24×7 high-speed internet access globally. Currently, 42.1 billion IoT devices exist. By 2020, this number is expected to be 50.1 billion. 2020 is the beginning of a mass rollout of 5G networks. By 2025, leaders of the 5G market will be Asia (primarily China & Japan), Europe, and the United States. Can mobile service providers create a secure environment that protects customers’ data and devices in time for the launch of 5G?
Watch Now

Veeam and AWS avengers:Data portability universe

veeam

Join Veeam® for a series of global webinars about Veeam’s partnership with AWS! Throughout February and March 2019, Andrew Zhelezko, Anthony Spiteri and David Hill will host a series of webinars covering all sorts of information about the AWS cloud, Veeam cloud tier and Veeam Availability for AWS. In a world where organizations desperately want to avoid lock-ins, data portability is critical to maintain speed and control over the environment. To do this, you can leverage the AWS cloud as an additional location for your hybrid data center or as on-demand recovery site. There’s no need to build or maintain a costly physical recovery site — you can backup anything anywhere and restore directly to AWS.
Watch Now